www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/po/malware-mobiles.de.po propri...


From: GNUN
Subject: www proprietary/po/malware-mobiles.de.po propri...
Date: Fri, 18 Mar 2016 05:28:52 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/03/18 05:28:52

Modified files:
        proprietary/po : malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po malware-mobiles.it.po 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
        thankgnus/po   : 2016supporters.pot 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2016supporters.pot?cvsroot=www&r1=1.18&r2=1.19

Patches:
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-mobiles.de.po        16 Feb 2016 06:42:57 -0000      
1.14
+++ proprietary/po/malware-mobiles.de.po        18 Mar 2016 05:28:51 -0000      
1.15
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2016-01-25 13:56+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2016-02-02 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: www-de <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -210,6 +211,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-";
 "spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
 "phones, including iPhones, Android, and BlackBerry</a>. While there is not "

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/malware-mobiles.es.po        25 Jan 2016 22:12:17 -0000      
1.12
+++ proprietary/po/malware-mobiles.es.po        18 Mar 2016 05:28:51 -0000      
1.13
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2016-01-25 13:56+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2016-01-25 22:52+0100\n"
 "Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 "X-Poedit-Language: Spanish\n"
 
 #. type: Content of: <title>
@@ -205,6 +206,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-";
 "spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
 "phones, including iPhones, Android, and BlackBerry</a>. While there is not "

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/malware-mobiles.fr.po        25 Jan 2016 15:59:59 -0000      
1.12
+++ proprietary/po/malware-mobiles.fr.po        18 Mar 2016 05:28:51 -0000      
1.13
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2016-01-25 13:56+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2016-01-25 14:22+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -203,6 +204,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-";
 "spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
 "phones, including iPhones, Android, and BlackBerry</a>. While there is not "

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-mobiles.it.po        31 Jan 2016 11:01:16 -0000      
1.14
+++ proprietary/po/malware-mobiles.it.po        18 Mar 2016 05:28:51 -0000      
1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2016-01-25 13:56+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2016-01-31 11:15+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -199,6 +200,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-";
 "spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
 "phones, including iPhones, Android, and BlackBerry</a>. While there is not "

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/malware-mobiles.ja.po        4 Feb 2016 08:31:36 -0000       
1.20
+++ proprietary/po/malware-mobiles.ja.po        18 Mar 2016 05:28:51 -0000      
1.21
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2016-01-25 13:56+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2016-01-27 10:27+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -196,6 +197,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-";
 "spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
 "phones, including iPhones, Android, and BlackBerry</a>. While there is not "

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/malware-mobiles.pot  25 Jan 2016 13:59:48 -0000      1.8
+++ proprietary/po/malware-mobiles.pot  18 Mar 2016 05:28:51 -0000      1.9
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2016-01-25 13:56+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -149,6 +149,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a "
+"href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\";>
 "
+"transmit personal data in an insecure way</a>.  However, the worse aspect of "
+"these apps is that <a "
+"href=\"/philosophy/surveillance-vs-democracy.html\">payment is not "
+"anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a "
 
"href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\";>
 "
 "The NSA can tap data in smart phones, including iPhones, Android, and "

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-mobiles.ru.po        25 Jan 2016 18:01:57 -0000      
1.16
+++ proprietary/po/malware-mobiles.ru.po        18 Mar 2016 05:28:51 -0000      
1.17
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2016-01-25 13:56+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2016-01-25 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -200,6 +201,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-";
 "spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
 "phones, including iPhones, Android, and BlackBerry</a>. While there is not "

Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-insecurity.de.po 1 Nov 2015 15:38:19 -0000       
1.24
+++ proprietary/po/proprietary-insecurity.de.po 18 Mar 2016 05:28:51 -0000      
1.25
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2015-10-24 08:25+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2015-10-26 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online (PUNKT) de>\n"
 "Language-Team: www-de <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -59,6 +60,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/";
 "latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
 "trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
@@ -465,7 +475,11 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+# | Copyright &copy; 2013, [-2015-] {+2015, 2016+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2013, 2015, 2016 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-insecurity.fr.po 27 Oct 2015 14:34:28 -0000      
1.30
+++ proprietary/po/proprietary-insecurity.fr.po 18 Mar 2016 05:28:51 -0000      
1.31
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-10-24 08:25+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2015-10-27 15:34+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -63,6 +64,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/";
 "latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
 "trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
@@ -404,8 +414,11 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016 Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2013, 2015, 2016 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -429,3 +442,6 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-insecurity.it.po 1 Jan 2016 14:55:24 -0000       
1.40
+++ proprietary/po/proprietary-insecurity.it.po 18 Mar 2016 05:28:51 -0000      
1.41
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-10-24 08:25+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2015-10-24 23:37+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -61,6 +62,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/";
 "latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
 "trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
@@ -403,8 +413,11 @@
 "traduzioni</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016 Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2013, 2015, 2016 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -428,6 +441,9 @@
 msgid "Updated:"
 msgstr "Ultimo aggiornamento:"
 
+#~ msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+
 #~ msgid ""
 #~ "This page is licensed under a <a rel=\"license\" href=\"http://";
 #~ "creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons Attribution-"

Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-insecurity.ja.po 3 Feb 2016 09:14:28 -0000       
1.34
+++ proprietary/po/proprietary-insecurity.ja.po 18 Mar 2016 05:28:51 -0000      
1.35
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-10-24 08:25+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2015-11-12 13:37+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -60,6 +61,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/";
 "latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
 "trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
@@ -384,8 +394,10 @@
 "README.translations.html\">翻訳 README</a>をご覧ください。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2013, 2015, 2016 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -406,3 +418,6 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "最終更新:"
+
+#~ msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."

Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-insecurity.pot   24 Oct 2015 08:29:21 -0000      
1.17
+++ proprietary/po/proprietary-insecurity.pot   18 Mar 2016 05:28:51 -0000      
1.18
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-10-24 08:25+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -48,6 +48,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a "
+"href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\";>
 "
+"transmit personal data in an insecure way</a>.  However, the worse aspect of "
+"these apps is that <a "
+"href=\"/philosophy/surveillance-vs-democracy.html\">payment is not "
+"anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "FitBit fitness trackers <a "
 
"href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\";>
 "
 "have a Bluetooth vulnerability</a> that allows attackers to send malware to "
@@ -281,7 +291,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2013, 2015, 2016 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-insecurity.ru.po 24 Oct 2015 09:28:33 -0000      
1.39
+++ proprietary/po/proprietary-insecurity.ru.po 18 Mar 2016 05:28:51 -0000      
1.40
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-10-24 08:25+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: 2015-10-24 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2016-03-18 05:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -61,6 +62,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/";
+"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
+"user-data\"> transmit personal data in an insecure way</a>.  However, the "
+"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
+"democracy.html\">payment is not anonymous</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/";
 "latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
 "trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
@@ -397,10 +407,12 @@
 "предложениям переводов наших статей см. в 
<a href=\"/server/standards/README."
 "translations.html\">&ldquo;Руководстве по 
переводам&rdquo;</a>."
 
-# type: Content of: <div><p>
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
+# | Copyright &copy; 201[-4-]{+3+}, 2015, 2016 Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2013, 2015, 2016 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -427,3 +439,7 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Обновлено:"
+
+# type: Content of: <div><p>
+#~ msgid "Copyright &copy; 2013, 2015 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."

Index: thankgnus/po/2016supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2016supporters.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- thankgnus/po/2016supporters.pot     12 Mar 2016 02:27:29 -0000      1.18
+++ thankgnus/po/2016supporters.pot     18 Mar 2016 05:28:52 -0000      1.19
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2016supporters.html\n"
-"POT-Creation-Date: 2016-03-12 02:25+0000\n"
+"POT-Creation-Date: 2016-03-18 05:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -210,6 +210,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "Open Invention Network c/o Keith Bergelt"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Paul Allen in honor of Mr. Aaron Swartz"
 msgstr ""
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]